Skip to main content
Erschienen in: Cluster Computing 6/2019

30.01.2018

Evaluation of neighbor credit value based AODV routing algorithms for selfish node behavior detection

verfasst von: K. Rama Abirami, M. G. Sumithra

Erschienen in: Cluster Computing | Sonderheft 6/2019

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Mobile ad hoc networks (MANETs) nodes interchange information by means of numerous intermediate nodes without the requirement of infrastructure (Toh, Ad hoc mobile wireless networks: protocols and systems, pp 34–37, 2002). Owing to the exposed arrangement and inadequate energy of the nodes, some nodes may not involve in the routing process properly (Laay et al., IEEE Commun Surv Tutor 10(4):78–93, 2008). This leads to selfish behavior of the nodes and moreover, some nodes do not have the chance to forward the packets, so they still idle in the network. Hence, these genuine idle nodes are also considered as selfish nodes and they are avoided in the routing process. To address this issue, credit-based protocols namely Neighbor credit value based and improved Neighbor credit value based Ad Hoc on demand distance vector (AODV) routing algorithms are proposed. These two protocols are evaluated against AODV for the better detection of selfish node behavior. Earlier works addressed the methods to overwhelm selfish behavior attack but fail in performance. A simple neighbor credit value based AODV (NCV-AODV) routing protocol was proposed to avoid such false detection. Some simple assumption is made on NCV-AODV that the nodes in the network are fundamentally not malicious and only some of the new nodes may be added to behave maliciously. This improved version is called improved Neighbor credit value based AODV (iNCV-AODV) protocol is proposed. The proposed two mechanisms are implemented in AODV routing protocol. An extensive analysis of the performance of the proposed detection mechanisms against the selfish behavior attack.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Toh, C.: Ad Hoc Mobile Wireless Networks: Protocols and Systems, pp. 34–37. Prentice-Hall, New Jersey (2002) Toh, C.: Ad Hoc Mobile Wireless Networks: Protocols and Systems, pp. 34–37. Prentice-Hall, New Jersey (2002)
2.
Zurück zum Zitat Loay, A., Ashfaq, K., Mohsen, G.: A survey of secure mobile ad hoc routing protocols. IEEE Commun. Surv. Tutor. 10(4), 78–93 (2008)CrossRef Loay, A., Ashfaq, K., Mohsen, G.: A survey of secure mobile ad hoc routing protocols. IEEE Commun. Surv. Tutor. 10(4), 78–93 (2008)CrossRef
3.
Zurück zum Zitat Toh, C.K., Kim, D., Oh, S.: The Controversy of Selfish Nodes in Ad Hoc Networks. In: The 12th International Conference, South Korea, pp. 1088–1092 (2010) Toh, C.K., Kim, D., Oh, S.: The Controversy of Selfish Nodes in Ad Hoc Networks. In: The 12th International Conference, South Korea, pp. 1088–1092 (2010)
4.
Zurück zum Zitat Das, S.K., Saha, B.J., Chatterjee, P.S.: Selfish Node Detection and Its Behaviors in WSN. In: 5th International Conference on Computing Communication and Networking, China (2014) Das, S.K., Saha, B.J., Chatterjee, P.S.: Selfish Node Detection and Its Behaviors in WSN. In: 5th International Conference on Computing Communication and Networking, China (2014)
6.
Zurück zum Zitat Wu, L.-W., Yu, R.-F.: A threshold—based method for selfish nodes detection in MANET. In: International Computer Symposium (ICS) (2010) Wu, L.-W., Yu, R.-F.: A threshold—based method for selfish nodes detection in MANET. In: International Computer Symposium (ICS) (2010)
7.
Zurück zum Zitat Raghuvanshi, R., Giluku, M.K., Dehalwar, V.: An approach to suppress selfish behavior of nodes in MANET by hiding destination identity in routing path. In: First International Conference, ACC, Kochi, pp. 153–161 (2011)CrossRef Raghuvanshi, R., Giluku, M.K., Dehalwar, V.: An approach to suppress selfish behavior of nodes in MANET by hiding destination identity in routing path. In: First International Conference, ACC, Kochi, pp. 153–161 (2011)CrossRef
8.
Zurück zum Zitat Kargl, F., Klenk, A., Schlott, S., Weber, M.: Advanced Detection of Selfish or malicious Nodes in Ad hoc Networks, Security in Ad-hoc and Sensor Networks. Lecture Notes in Computer Science, vol. 3313, pp. 152–165. Springer, Berlin (2004) Kargl, F., Klenk, A., Schlott, S., Weber, M.: Advanced Detection of Selfish or malicious Nodes in Ad hoc Networks, Security in Ad-hoc and Sensor Networks. Lecture Notes in Computer Science, vol. 3313, pp. 152–165. Springer, Berlin (2004)
11.
Zurück zum Zitat Eidenbenz, S., Resta, G., Santi, P.: The COMMIT protocol for truthful and cost-efficient routing in ad hoc networks with selfish nodes. IEEE Trans. Mob. Comput. 7(1), 19–33 (2008)CrossRef Eidenbenz, S., Resta, G., Santi, P.: The COMMIT protocol for truthful and cost-efficient routing in ad hoc networks with selfish nodes. IEEE Trans. Mob. Comput. 7(1), 19–33 (2008)CrossRef
12.
Zurück zum Zitat Pakzad, F.: Intrusion detection techniques for detecting misbehaving nodes. Comput. Inf. Sci. 4(1), 26–33 (2011) Pakzad, F.: Intrusion detection techniques for detecting misbehaving nodes. Comput. Inf. Sci. 4(1), 26–33 (2011)
13.
Zurück zum Zitat Hernandez-Orallo, E., Olmos, M.D.S., Cano, J.C., Calafate, C.T., Manzoni, P.: CoCoWa: a collaborative contact-based watchdog for detecting selfish nodes. IEEE Trans. Mob. Comput. 14(6), 1162–1175 (2015)CrossRef Hernandez-Orallo, E., Olmos, M.D.S., Cano, J.C., Calafate, C.T., Manzoni, P.: CoCoWa: a collaborative contact-based watchdog for detecting selfish nodes. IEEE Trans. Mob. Comput. 14(6), 1162–1175 (2015)CrossRef
14.
Zurück zum Zitat Rama Abirami, K., Sumithra, M.G.: An improved neighbor credit value based AODV routing algorithm for preventing the impact of selfish behavior under MANET. World Appl. Sci. J. 35(3), 334–343 (2017) Rama Abirami, K., Sumithra, M.G.: An improved neighbor credit value based AODV routing algorithm for preventing the impact of selfish behavior under MANET. World Appl. Sci. J. 35(3), 334–343 (2017)
15.
Zurück zum Zitat Kurkowsky, S., Camp, T., Colagrosso, M.: MANET simulation studies: the incredible. Mob. Comput. Commun. Rev. 9(4), 50–61 (2005) Kurkowsky, S., Camp, T., Colagrosso, M.: MANET simulation studies: the incredible. Mob. Comput. Commun. Rev. 9(4), 50–61 (2005)
Metadaten
Titel
Evaluation of neighbor credit value based AODV routing algorithms for selfish node behavior detection
verfasst von
K. Rama Abirami
M. G. Sumithra
Publikationsdatum
30.01.2018
Verlag
Springer US
Erschienen in
Cluster Computing / Ausgabe Sonderheft 6/2019
Print ISSN: 1386-7857
Elektronische ISSN: 1573-7543
DOI
https://doi.org/10.1007/s10586-018-1851-6

Weitere Artikel der Sonderheft 6/2019

Cluster Computing 6/2019 Zur Ausgabe